Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    08-10-2024 02:04

General

  • Target

    1efcd378148d820ca9af363976597b03_JaffaCakes118.exe

  • Size

    5.5MB

  • MD5

    1efcd378148d820ca9af363976597b03

  • SHA1

    646a91c6a85b992e20c9d681fa42c7e309844c9a

  • SHA256

    b2c5593ff16f6c5f45ea569dffc4e12ef9161240e938de9c4e9eb1cb148b3e31

  • SHA512

    c958032a1f892d797a20a4c2d00b410f99da8b0d11615d3283c1e81ec006844f0f679d23dba835db689818015fc59e1bdf2d78a106798330e746f2b111f681bb

  • SSDEEP

    98304:7JYz+TnI90/Dcf2+p/2yFlw989s9eyflBsQDPK7w+HwtMmtXTi:7Ju+rIq/I15Pw9OsLflBLAw+CMmVTi

Malware Config

Signatures

  • RMS

    Remote Manipulator System (RMS) is a remote access tool developed by Russian organization TektonIT.

  • UAC bypass 3 TTPs 2 IoCs
  • Sets file to hidden 1 TTPs 1 IoCs

    Modifies file attributes to stop it showing in Explorer etc.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 12 IoCs
  • Loads dropped DLL 23 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 7 IoCs
  • Drops file in Program Files directory 16 IoCs
  • Drops file in Windows directory 21 IoCs
  • Command and Scripting Interpreter: JavaScript 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 39 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Modifies data under HKEY_USERS 3 IoCs
  • Modifies registry class 64 IoCs
  • Modifies registry key 1 TTPs 2 IoCs
  • Runs ping.exe 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1efcd378148d820ca9af363976597b03_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\1efcd378148d820ca9af363976597b03_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2004
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\stop.js"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2104
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\Users\Admin\AppData\Local\Temp\install.bat" "
        3⤵
        • Loads dropped DLL
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2980
        • C:\Windows\SysWOW64\attrib.exe
          attrib +s +h +r "C:\Windows/system32/sysfiles/wina.exe"
          4⤵
          • Sets file to hidden
          • Drops file in System32 directory
          • System Location Discovery: System Language Discovery
          • Views/modifies file attributes
          PID:3068
        • C:\Windows\SysWOW64\sysfiles\wina.exe
          wina.exe
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2920
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c ""C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\install.cmd" "
            5⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2780
            • C:\Windows\SysWOW64\chcp.com
              chcp 1251
              6⤵
              • System Location Discovery: System Language Discovery
              PID:444
            • C:\Windows\SysWOW64\msiexec.exe
              MsiExec /x {61FFA475-24D5-44FB-A51F-39B699E3D82C} /qn REBOOT=ReallySuppress
              6⤵
              • System Location Discovery: System Language Discovery
              • Suspicious use of AdjustPrivilegeToken
              PID:2684
            • C:\Windows\SysWOW64\msiexec.exe
              MsiExec /x {11A90858-40BB-4858-A2DA-CA6495B5E907} /qn REBOOT=ReallySuppress
              6⤵
              • System Location Discovery: System Language Discovery
              PID:2904
            • C:\Windows\SysWOW64\PING.EXE
              ping 127.0.0.1
              6⤵
              • System Location Discovery: System Language Discovery
              • System Network Configuration Discovery: Internet Connection Discovery
              • Runs ping.exe
              PID:2900
            • C:\Windows\SysWOW64\msiexec.exe
              MsiExec /I "rms.server5.1b1ru.msi" /qn
              6⤵
              • System Location Discovery: System Language Discovery
              PID:1660
            • C:\Windows\SysWOW64\reg.exe
              reg delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Un install\{11A90858-40BB-4858-A2DA-CA6495B5E907}" /f
              6⤵
              • System Location Discovery: System Language Discovery
              PID:2136
            • C:\Windows\SysWOW64\reg.exe
              reg delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\In staller\UserData\S-1-5-18\Products\85809A11BB0485842AADAC46595B9E70\Insta llProperties" /f
              6⤵
              • System Location Discovery: System Language Discovery
              PID:1860
            • C:\Windows\SysWOW64\reg.exe
              REG ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
              6⤵
              • UAC bypass
              • System Location Discovery: System Language Discovery
              • Modifies registry key
              PID:1592
            • C:\Windows\SysWOW64\reg.exe
              reg delete "HKCR\Installer\Products\85809A11BB0485842AADAC465 95B9E70" /f
              6⤵
              • System Location Discovery: System Language Discovery
              PID:3040
        • C:\Windows\SysWOW64\sysfiles\PriceList.txt
          PriceList.txt
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1872
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c ""C:\Users\Admin\AppData\Local\Temp\7ZipSfx.001\install.cmd" "
            5⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:1996
            • C:\Windows\SysWOW64\chcp.com
              chcp 1251
              6⤵
              • System Location Discovery: System Language Discovery
              PID:2212
            • C:\Windows\SysWOW64\msiexec.exe
              MsiExec /x {61FFA475-24D5-44FB-A51F-39B699E3D82C} /qn REBOOT=ReallySuppress
              6⤵
              • System Location Discovery: System Language Discovery
              • Suspicious use of AdjustPrivilegeToken
              PID:1696
            • C:\Windows\SysWOW64\msiexec.exe
              MsiExec /x {11A90858-40BB-4858-A2DA-CA6495B5E907} /qn REBOOT=ReallySuppress
              6⤵
              • System Location Discovery: System Language Discovery
              PID:2932
            • C:\Windows\SysWOW64\PING.EXE
              ping 127.0.0.1
              6⤵
              • System Location Discovery: System Language Discovery
              • System Network Configuration Discovery: Internet Connection Discovery
              • Runs ping.exe
              PID:2564
            • C:\Windows\SysWOW64\msiexec.exe
              MsiExec /I "rms.server5.1b1ru.msi" /qn
              6⤵
              • System Location Discovery: System Language Discovery
              PID:2016
            • C:\Windows\SysWOW64\reg.exe
              reg delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Un install\{11A90858-40BB-4858-A2DA-CA6495B5E907}" /f
              6⤵
              • System Location Discovery: System Language Discovery
              PID:2908
            • C:\Windows\SysWOW64\reg.exe
              reg delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\In staller\UserData\S-1-5-18\Products\85809A11BB0485842AADAC46595B9E70\Insta llProperties" /f
              6⤵
              • System Location Discovery: System Language Discovery
              PID:1040
            • C:\Windows\SysWOW64\reg.exe
              REG ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
              6⤵
              • UAC bypass
              • System Location Discovery: System Language Discovery
              • Modifies registry key
              PID:2316
            • C:\Windows\SysWOW64\reg.exe
              reg delete "HKCR\Installer\Products\85809A11BB0485842AADAC465 95B9E70" /f
              6⤵
              • System Location Discovery: System Language Discovery
              PID:976
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\7ZSfx000.cmd" "
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:2824
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2164
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding ADA4125E764DD9BAD0DD249FFC27C4BA
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:536
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 5CF7DC6C49EA03A3416E28DCDE63C92E M Global\MSI0000
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      PID:2008
    • C:\Program Files (x86)\Remote Manipulator System - Server\rfusclient.exe
      "C:\Program Files (x86)\Remote Manipulator System - Server\rfusclient.exe" /server /silentinstall
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:2236
      • C:\Program Files (x86)\Remote Manipulator System - Server\rutserv.exe
        "C:\Program Files (x86)\Remote Manipulator System - Server\rutserv.exe" /silentinstall
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        PID:2460
    • C:\Program Files (x86)\Remote Manipulator System - Server\rfusclient.exe
      "C:\Program Files (x86)\Remote Manipulator System - Server\rfusclient.exe" /server /firewall
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:1696
      • C:\Program Files (x86)\Remote Manipulator System - Server\rutserv.exe
        "C:\Program Files (x86)\Remote Manipulator System - Server\rutserv.exe" /firewall
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:2684
    • C:\Program Files (x86)\Remote Manipulator System - Server\rfusclient.exe
      "C:\Program Files (x86)\Remote Manipulator System - Server\rfusclient.exe" /server /start
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:1760
      • C:\Program Files (x86)\Remote Manipulator System - Server\rutserv.exe
        "C:\Program Files (x86)\Remote Manipulator System - Server\rutserv.exe" /start
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:1144
  • C:\Program Files (x86)\Remote Manipulator System - Server\rutserv.exe
    "C:\Program Files (x86)\Remote Manipulator System - Server\rutserv.exe"
    1⤵
    • Executes dropped EXE
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    PID:2324
    • C:\Program Files (x86)\Remote Manipulator System - Server\rfusclient.exe
      "C:\Program Files (x86)\Remote Manipulator System - Server\rfusclient.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:1628
      • C:\Program Files (x86)\Remote Manipulator System - Server\rfusclient.exe
        "C:\Program Files (x86)\Remote Manipulator System - Server\rfusclient.exe" /tray
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:2376
    • C:\Program Files (x86)\Remote Manipulator System - Server\rfusclient.exe
      "C:\Program Files (x86)\Remote Manipulator System - Server\rfusclient.exe" /tray
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2448

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Config.Msi\f7792b2.rbs

    Filesize

    13KB

    MD5

    1301ef4e76f765c94e59ac0cd75c17bf

    SHA1

    78837140b7287e4a0b047c2bad08a03fe8010bc3

    SHA256

    dfc296c960d68fd8994b72f04cd6089446d787703f1f17aaaa57182ce8ae62d3

    SHA512

    910fa0c82c52343963fff31f8a33569b743586f52d14d6d7ca82633cd9d0efae40e45a4ffb833430ef6cb48f976258ec411ffb918987d7af3b1a3fd4e21bf77c

  • C:\Program Files (x86)\Remote Manipulator System - Server\English.lg

    Filesize

    32KB

    MD5

    404e37e676e429d458fd460681ba98b2

    SHA1

    f85e6c339457de81df9f072f2cc205fae606b5e8

    SHA256

    19499add88ab94748cb87b0d5cbe7a69ad6d2b10699707ddaa758a63e8244732

    SHA512

    68bf13cb2076e5d74814afaa9c67fc998a7172f1afa2f8c4d2c2112293871e08905fb9898672440b4b335a356895bf0bbf10ed1225011f2f77ada09c44385b78

  • C:\Program Files (x86)\Remote Manipulator System - Server\HookDrv.dll

    Filesize

    144KB

    MD5

    513066a38057079e232f5f99baef2b94

    SHA1

    a6da9e87415b8918447ec361ba98703d12b4ee76

    SHA256

    02dbea75e8dbcdfc12c6b92a6c08efad83d4ca742ed7aee393ab26cab0c58f9e

    SHA512

    83a074bef57f78ede2488dd586b963b92837e17eea77ebd1464f3da06954ae8ca07f040089af0c257e2836611ae39424574bd365aea4a6318a2707e031cd31a5

  • C:\Program Files (x86)\Remote Manipulator System - Server\RIPCServer.dll

    Filesize

    96KB

    MD5

    329354f10504d225384e19c8c1c575db

    SHA1

    9ef0b6256f3c5bbeb444cb00ee4b278847e8aa66

    SHA256

    24735b40df2cdac4da4e3201fc597eed5566c5c662aa312fa491b7a24e244844

    SHA512

    876585dd23f799f1b7cef365d3030213338b3c88bc2b20174e7c109248319bb5a3feaef43c0b962f459b2f4d90ff252c4704d6f1a0908b087e24b4f03eba9c0e

  • C:\Program Files (x86)\Remote Manipulator System - Server\RWLN.dll

    Filesize

    325KB

    MD5

    cf6ce6b13673dd11f0cd4b597ac56edb

    SHA1

    2017888be6edbea723b9b888ac548db5115df09e

    SHA256

    7bda291b7f50049088ea418b5695929b9be11cc014f6ec0f43f495285d1d6f74

    SHA512

    e5b69b4ee2ff8d9682913a2f846dc2eca8223d3100d626aea9763653fe7b8b35b8e6dc918f4c32e8ae2fc1761611dcd0b16d623ede954f173db33216b33f49dc

  • C:\Program Files (x86)\Remote Manipulator System - Server\Russian.lg

    Filesize

    35KB

    MD5

    281268d00c47bee9c7308d5f2be8e460

    SHA1

    cb5153ec385b5df57d1f8d583cf20ff5d4d5309f

    SHA256

    8a156137ea18c294d7473170e905c3fadfc3ddec8d099e1b8c63a48e58e8271d

    SHA512

    8561ab264552fff701e04b61caab465e49e064153a4b27c05ae8fb71b7e449f9281b5d8183b3204b57bbc2356157af446ef7d08d96f0ad30b41e93536557509f

  • C:\Program Files (x86)\Remote Manipulator System - Server\dsfVorbisDecoder.dll

    Filesize

    234KB

    MD5

    8e3f59b8c9dfc933fca30edefeb76186

    SHA1

    37a78089d5936d1bc3b60915971604c611a94dbd

    SHA256

    528c0656751b336c10cb4c49b703eae9c3863f7f416d0e09b198b082cc54aeb8

    SHA512

    3224c20c30556774fd4bed78909f451b9a5a46aa59271b5e88b1e0e60145d217802a8f1fda3d3fabcd8546ca7783e0c70f0c419a28efe6c5160a102553a3c91d

  • C:\Program Files (x86)\Remote Manipulator System - Server\dsfVorbisEncoder.dll

    Filesize

    1.6MB

    MD5

    ff622a8812d8b1eff8f8d1a32087f9d2

    SHA1

    910615c9374b8734794ac885707ff5370db42ef1

    SHA256

    1b8fe11c0bdcbf1f4503c478843de02177c606912c89e655e482adec787c2ebf

    SHA512

    1a7c49f172691bf071df0d47d6ee270afbfa889afb8d5bd893496277fd816630ecd7b50c978b53d88228922ba6070f382b959ffc389394e0f08daab107369931

  • C:\Program Files (x86)\Remote Manipulator System - Server\msvcp90.dll

    Filesize

    556KB

    MD5

    b2eee3dee31f50e082e9c720a6d7757d

    SHA1

    3322840fef43c92fb55dc31e682d19970daf159d

    SHA256

    4608beedd8cf9c3fc5ab03716b4ab6f01c7b7d65a7c072af04f514ffb0e02d01

    SHA512

    8b1854e80045001e7ab3a978fb4aa1de19a3c9fc206013d7bc43aec919f45e46bb7555f667d9f7d7833ab8baa55c9098af8872006ff277fc364a5e6f99ee25d3

  • C:\Program Files (x86)\Remote Manipulator System - Server\msvcr90.dll

    Filesize

    637KB

    MD5

    7538050656fe5d63cb4b80349dd1cfe3

    SHA1

    f825c40fee87cc9952a61c8c34e9f6eee8da742d

    SHA256

    e16bc9b66642151de612ee045c2810ca6146975015bd9679a354567f56da2099

    SHA512

    843e22630254d222dfd12166c701f6cd1dca4a8dc216c7a8c9c0ab1afc90189cfa8b6499bbc46408008a1d985394eb8a660b1fa1991059a65c09e8d6481a3af8

  • C:\Program Files (x86)\Remote Manipulator System - Server\rfusclient.exe

    Filesize

    3.3MB

    MD5

    25f54262e5014b889caece94570d449f

    SHA1

    965afeff08735bc7ca7140373e6b3d0d1bd64d2e

    SHA256

    4834c03292e9dffe902a963633c7e417856cfd69f15d6fcec2aac6b5ba2bbdea

    SHA512

    df2ab04fdb8994821d4d763ddf59b0e4bef69f193dd681fd262953cb718b003b6aec28933c6bb9aa83780ad9746101141194657f58fdea16f11c560441081090

  • C:\Program Files (x86)\Remote Manipulator System - Server\rutserv.exe

    Filesize

    3.8MB

    MD5

    8008e5a7f569e95bd2ebb05d347f481e

    SHA1

    12c02cb2d01af5aa98b8b04b31e39cee1302fc2c

    SHA256

    9d4d210565d9f8ce269dbe71c46e744a0ff4544069a2b73abd411122a49c60f5

    SHA512

    217f86d10f204443d449599cdec2804b00f35eab08c19e856606dbe4d782f1295c7b776178bcce5ca5655686df37030cef03f51414ba57103b71fb16ad0b2a82

  • C:\Program Files (x86)\Remote Manipulator System - Server\vp8decoder.dll

    Filesize

    403KB

    MD5

    6f6bfe02e84a595a56b456f72debd4ee

    SHA1

    90bad3ae1746c7a45df2dbf44cd536eb1bf3c8e2

    SHA256

    5e59b566eda7bb36f3f5d6dd39858bc9d6cf2c8d81deca4ea3c409804247da51

    SHA512

    ed2a7402699a6d00d1eac52b0f2dea4475173be3320dfbad5ca58877f06638769533229bc12bce6650726d3166c0e5ebac2dad7171b77b29186d4d5e65818c50

  • C:\Program Files (x86)\Remote Manipulator System - Server\vp8encoder.dll

    Filesize

    685KB

    MD5

    c638bca1a67911af7f9ed67e7b501154

    SHA1

    0fd74d2f1bd78f678b897a776d8bce36742c39b7

    SHA256

    519078219f7f6db542f747702422f902a21bfc3aef8c6e6c3580e1c5e88162b8

    SHA512

    ca8133399f61a1f339a14e3fad3bfafc6fe3657801fd66df761c88c18b2dc23ceb02ba6faa536690986972933bec2808254ef143c2c22f881285facb4364659f

  • C:\Users\Admin\AppData\Local\Temp\7ZSfx000.cmd

    Filesize

    264B

    MD5

    0711c29dd659abfd612b237abf47252f

    SHA1

    5b91ae70492df82f95eb437a70674fdac6fd8c48

    SHA256

    fef38a35da3e9769792f8e197e99700fee520da08a8bb7a0f1e9c165572e3b6d

    SHA512

    6442aa20e0e84a758ed1161c597a2f328e86b59d90550e291770dea9f3701c11fa8c31afe02a4e36fea421e0ddfbe43669279df5845f93dc7fbbd3a03b62a85a

  • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\install.cmd

    Filesize

    676B

    MD5

    bcddabeb8242a5516bcbe0f8d71b3aff

    SHA1

    a9ec03f8e11b9fb0fa25d6588be405f8ec0216db

    SHA256

    25e51dc0b0f84e88e259b78bddd61fe419a3ce9559633a93a5946b2705c001ac

    SHA512

    ceed12a5dfeb2fde589603fa3f17f45ef2fb4f382b49676165590d6aa0317a1b6b2c341fc96ef343c09ab74dc53ea363349633231ac66ca6dbfea843100bb2ac

  • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\rms.server5.1b1ru.msi

    Filesize

    5.9MB

    MD5

    811c1c8d3167154445092b90ba065f6a

    SHA1

    5fefb49dfd1ddcfbb1868b673e9014c14585a9d2

    SHA256

    1804dd49f2f6ded54ff4fb3d2f04d537998a27393d55d1860576692035d0de61

    SHA512

    3acb0676288b027d70fe07d6a065f6037df3e9195d8d5f645ec6949573e1218d0003886e87afbf66f123cad38f92fa23898bad45f2811c930262e8c49664157d

  • C:\Users\Admin\AppData\Local\Temp\install.bat

    Filesize

    323B

    MD5

    07887234b2ca76e977fa39288a534f79

    SHA1

    1710cd06a0e29f38154781f012dec3c8c2f386fe

    SHA256

    808fd3c38a3ed4d640319a402083b0dc71e4b49c14048b9e85b6a99a7e30a9e8

    SHA512

    bcd287d00720ddcbd894199adb6d027b56fefc4827bbfaf0ec1f2afcdaba95fc043b12e5003ae3b1f557a6f46047712c6eaf2c14bb64f22bb40acd2482816f42

  • C:\Users\Admin\AppData\Local\Temp\stop.js

    Filesize

    215B

    MD5

    804b35ef108ec9839eb6a9335add8ca1

    SHA1

    bf91e6645c4a1c8cab2d20388469da9ed0a82d56

    SHA256

    fe111b7ea4e14ab7ba5004aea52b10030e0282bb5c40d4ba55761a2c5be59406

    SHA512

    822a3ec5e0e353058d4355bc01a44440dafe8d16c57744a3dcbc962eb110ed3f6843556568616bfc5dc7fad5f5832cd27d6591dc50105f2c79fc16c33919936d

  • C:\Users\Admin\AppData\Local\Temp\wina.exe

    Filesize

    5.4MB

    MD5

    ace3f7113d67e21da075ef133f866213

    SHA1

    901c8fa7d7c711706e3ae8c3d06afdc6720f8a07

    SHA256

    6867239ef5b381ff05f2cfa6bf14be0beac698588cf198c264912cfb8475207a

    SHA512

    5cc8ba9fbe37bc70cb0f62261266b13e7017ba816e24089f2989100b2e1da20f53c7351e5361e636a18d1cf9fa9e3243b7878675bec084377151e9c041ded461

  • C:\Users\Admin\AppData\Local\Temp\~9675.tmp

    Filesize

    1KB

    MD5

    6177d1d6c3c98c6a693b37860f30ea6b

    SHA1

    82c5f128489a1a194aaa6db641a2e8cf4e560f5b

    SHA256

    0903b4c9d92d3ff9026f61801faace5946f81713746b66ab9748829a93154c76

    SHA512

    fa4523f7dac49172e5c9b4db38f4e9f3d65b18410a1fddcaaffd960ff8a2ec20abe1abb31ea0a4fcd6aa2c83eda389525b71ad1ab6d7bbfa5bd1b0487008846e

  • C:\Users\Admin\AppData\Local\Temp\~9675.tmp

    Filesize

    1KB

    MD5

    1413530e795e51e7b5a0c5ca53489911

    SHA1

    c6c936d07249c927ec5bab0acd702b2890379eba

    SHA256

    1f9d959e9163930791111a67b3a18689b01b512c15e5b53dcc4c6e28d2d10fa4

    SHA512

    6680d4288c0e9b1d89dfc8e57839164411c92e11d8d418369c4743150e5e2ff9c8415ea28b6e2f4f642fd89c3ddb969476ea2c1ab34d5a15e947b45bef1efbb4

  • C:\Users\Admin\AppData\Local\Temp\~9675.tmp

    Filesize

    1KB

    MD5

    a326927fc5c5b40517642a5c1e1fcc08

    SHA1

    7c44080ecf01293443a95a93aad965aa59698369

    SHA256

    3e7982c5eb7c0ce065f4b66c622a73e5d687ec34ba5633fabf593cdc563bd293

    SHA512

    8abff473f2fc2180bec253c0deddc65f8dc3a97f7a0c91890ea4b372a14198f4ae66cec7201ad35fa79a4953a9ac6447a92d33c01dd61ad4a8e7f784ee085e27

  • C:\Users\Admin\AppData\Local\Temp\~9675.tmp

    Filesize

    1KB

    MD5

    fb03ea99c80884fc0bfdb084ad6d9b15

    SHA1

    f4e9b6cc70de0ae5095973b16fdcd192ef792e9b

    SHA256

    5756daf73a280857b65096ec16e93092c7501ccdfc9b3c602fd2e9ad210c911b

    SHA512

    0d5705f5a1b09022e2d8054c782b868635d3b7bd494400b50d980e111fe3462afd7777c0b7d8aab36652ccf7d8fd160319380f2fb3327654d2ffe9b4546352db

  • C:\Users\Admin\AppData\Local\Temp\~9675.tmp

    Filesize

    1KB

    MD5

    3191b3011a4e7d1319d41945c5cc770b

    SHA1

    e985a16536f205b5c58a50310a3860df007ac164

    SHA256

    4c1938092f84eb5f35b9ca3060c3faf4eef047f852d903fcd479ded13ed56e2d

    SHA512

    7763b1ccfcbcd4faeb2537a161b97844aae417eac46b7ad7fe4018dd109a9c52964b1e9a8b5a8723cb5feeb0588169a49419ab77dc6de125a40b04afebce21cc

  • C:\Windows\Installer\MSI95EA.tmp

    Filesize

    165KB

    MD5

    b9be841281819a5af07e3611913a55f5

    SHA1

    d300645112844d2263dac11fcd8298487a5c04e0

    SHA256

    2887c57b49ce17c0e490aa7872f2da51321e2dde26c04ab7a6afcde9eab005d9

    SHA512

    7393bade0f42794279660f66aad4f4bd7dae63ff29ff19be4c4c86a4c26cf7291af1514e1475e96c2169536747c08beeec8bda30eecfb5da476709c19062b2e0

  • C:\Windows\Installer\{11A90858-40BB-4858-A2DA-CA6495B5E907}\config_server_066CADD456D84808BDCEE928E4286C5B.exe

    Filesize

    56KB

    MD5

    4f3d5ebd449ca2d2b624424daf16a7ea

    SHA1

    b7673ae124169664ce0c091806094fff1eb2196d

    SHA256

    f349a4c890288560fa3f1a12f16ad16c442c7e56ad17128df7800751b2ca4d97

    SHA512

    2408b350ccb68cba3f30f2519817e9a8bc4bdba2c935ef4b2c82bbe72db65ddf7fe10890bc3488ca3bef11806839776140c06568833a3a09ed64e228816d0dd8

  • memory/1144-324-0x0000000000400000-0x000000000085F000-memory.dmp

    Filesize

    4.4MB

  • memory/1628-331-0x0000000000400000-0x00000000007D5000-memory.dmp

    Filesize

    3.8MB

  • memory/1696-307-0x0000000000400000-0x00000000007D5000-memory.dmp

    Filesize

    3.8MB

  • memory/1760-325-0x0000000000400000-0x00000000007D5000-memory.dmp

    Filesize

    3.8MB

  • memory/2008-208-0x0000000002DB0000-0x0000000002F50000-memory.dmp

    Filesize

    1.6MB

  • memory/2008-200-0x0000000000AB0000-0x0000000000B19000-memory.dmp

    Filesize

    420KB

  • memory/2008-196-0x0000000000950000-0x000000000098D000-memory.dmp

    Filesize

    244KB

  • memory/2008-204-0x0000000002C40000-0x0000000002CFB000-memory.dmp

    Filesize

    748KB

  • memory/2236-299-0x0000000000400000-0x00000000007D5000-memory.dmp

    Filesize

    3.8MB

  • memory/2324-333-0x0000000000400000-0x000000000085F000-memory.dmp

    Filesize

    4.4MB

  • memory/2324-330-0x0000000000400000-0x000000000085F000-memory.dmp

    Filesize

    4.4MB

  • memory/2324-336-0x0000000000400000-0x000000000085F000-memory.dmp

    Filesize

    4.4MB

  • memory/2324-364-0x0000000000400000-0x000000000085F000-memory.dmp

    Filesize

    4.4MB

  • memory/2376-329-0x0000000000400000-0x00000000007D5000-memory.dmp

    Filesize

    3.8MB

  • memory/2448-332-0x0000000000400000-0x00000000007D5000-memory.dmp

    Filesize

    3.8MB

  • memory/2448-335-0x0000000000400000-0x00000000007D5000-memory.dmp

    Filesize

    3.8MB

  • memory/2460-298-0x0000000000400000-0x000000000085F000-memory.dmp

    Filesize

    4.4MB

  • memory/2684-306-0x0000000000400000-0x000000000085F000-memory.dmp

    Filesize

    4.4MB